The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1997 (conf/csfw/1997)

  1. Steve Schneider
    Verifying authentication protocols with CSP. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:3-17 [Conf]
  2. Gavin Lowe
    Casper: A Compiler for the Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:18-30 [Conf]
  3. Gavin Lowe
    A Hierarchy of Authentication Specification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:31-44 [Conf]
  4. James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui
    Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:45-58 [Conf]
  5. Tuomas Aura
    Strategies against Replay Attacks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:59-69 [Conf]
  6. Lawrence C. Paulson
    Proving Properties of Security Protocols by Induction. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:70-83 [Conf]
  7. Lawrence C. Paulson
    Mechanized proofs for a recursive authentication protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:84-95 [Conf]
  8. Catherine Meadows
    Languages for Formal Specification of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:96-97 [Conf]
  9. Martín Abadi
    On SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:98-108 [Conf]
  10. Paul F. Syverson
    A Different Look at Secure Distributed Computation. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:109-115 [Conf]
  11. Dahlia Malkhi, Michael K. Reiter
    Unreliable Intrusion Detection in Distributed Computations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:116-125 [Conf]
  12. Jianying Zhou, Dieter Gollmann
    An Efficient Non-repudiation Protocol . [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:126-132 [Conf]
  13. Dominique Bolignano
    Towards the Formal Verification of Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:133-147 [Conf]
  14. Kan Zhang
    A Theory for System Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:148-155 [Conf]
  15. Dennis M. Volpano, Geoffrey Smith
    Eliminating Covert Flows with Minimum Typings. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:156-169 [Conf]
  16. J. Sinclair
    The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:170-172 [Conf]
  17. Yun Bai, Vijay Varadharajan
    A Logic For State Transformations in Authorization Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:173-182 [Conf]
  18. Richard Simon, Mary Ellen Zurko
    Separation of Duty in Role-based Environments. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:183-194 [Conf]
  19. Ciarán Bryce
    Security Engineering of Lattice-Based Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:195-208 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002